Results 1 to 10 of about 167,707 (166)
Marek’s Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size [PDF]
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Dharani K. Ajithdoss +3 more
doaj +2 more sources
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до подальшого використання MD5 з урахуванням знайдених вразливостей.
Гугнин, Владимир Николаевич +1 more
core +5 more sources
تحسين خوارزمية MD5 بالاعتماد على عدة طرق
المستخلص خوارزميات Hash هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية . هذا البحث يعمل على تعزيز خوارزميةMD5 ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5 هو استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان +1 more
doaj +2 more sources
Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey +4 more
doaj +2 more sources
Improved collision detection of MD5 with additional sufficient conditions
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang +6 more
doaj +1 more source
An Electro-optical Hybrid Encryption Method based on MD5 Verification
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran +5 more
doaj +3 more sources
Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj +1 more source
In recent years, outbreaks of Marek’s disease (MD) have been frequently reported in vaccinated chicken flocks in China. Herein, we have demonstrated that four Marek’s disease virus (MDV) isolates, HN502, HN302, HN304, and HN101, are all pathogenic and ...
Man Teng +9 more
doaj +1 more source
PENERAPAN ALGORITMA MESSAGE DIGEST 5 PADA FILE VIDEO
The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos.
Rivalri Kristianto Hondro
doaj +1 more source
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba +3 more
doaj +1 more source

